Wearables in the Workplace, Get the Policy Right Today
Posted on: 17 Jun 2014
Do your workplace policies cover wearable devices? Many commercial and Government facilities ban cameras and cellular phones with cameras, but having such policies and not enforcing them can hurt you in the…
Thermal Imaging Attacks; Research Heats Up!
Posted on: 19 Dec 2013
We’ve all had or seen server room doors protected by combination locks. Most safes these days are protected by electronic keypads, like the ones used to safeguard on-site backup tapes. Using…
Sometimes Your Employees Go Home; The Case for Securing Home Users
Posted on: 21 Nov 2013
Bring your own devices (BYOD), USB flash drives, signing into compromised personal web-based accounts from work, and shared passwords. These are some of the reasons for information security professionals to train…
Software Defined Radio: A Hacker’s Dream
Posted on: 11 Nov 2013
Wireless cameras, RFID key cards, keyboards, cordless phones, just about every wireless technology that isn’t light- or sound-based will attract a hoard of researchers (and attackers) looking at ways to exploit …
Can’t Touch This? Researchers Successfully Eavesdrop on Contactless Cards
Posted on: 06 Nov 2013
Contactless card transactions are becoming increasingly popular in the United States, Europe and Asia. In the United Kingdom alone there are some 34.5 million cards in issue with contactless functionality…
Firmware Attacks on the Uptick
Posted on: 04 Nov 2013
Firmware attacks are growing increasingly popular among software hackers. Despite efforts to issue patches for firmware, reported attacks are on the uptick. For instance, Ruben Santamarta, a security researcher at IOActive, recently…
MIT Researchers Uncover Security Flaws in C and C++ Software
Posted on: 01 Nov 2013
MIT researchers have produced a new paper that uncovers security flaws in C and C++ software, generated by compiler optimizations that discard ambiguous code or code, which produce undefined behavior. Some of…
Wormiversary!
Posted on: 01 Nov 2013
November 2, 2013 is the 25th anniversary of the Morris Worm. In the intervening years, we have not solved the problems of buffer overflows, reusable single-factor credentials, peer-to-peer trust or password…